Is there any cryptographic obfuscation scheme that will let me obfuscate a program that reveals my secret, if you reveal yours?
Formalization. Let $C(\cdot),V(\cdot)$ be a secure commitment scheme. ...

I've always been curious as to how Pay-TV and other Conditional Access systems actually stay secure for any amount of time, given that they are usually one way and (I'm assuming) use symmetric keys ...

Consider that you stumble upon 5 different AES output strings. One of these strings can be decrypted with a secret phrase, the other four strings are based on the real string but have had random parts ...

Imagine the following situation. There is an application for a microcontroller-driven system. The profits are made from manufacturing and selling the device itself. However, it is expected, that the ...